2016: a year of ransomware in spam

According to Kaspersky Lab “Spam and phishing in 2016” report, about 20 per cent of all spam emails in Q4 2016 distributed ransomware Trojans.

  • 7 years ago Posted in
The Kaspersky Lab spam report also identified the following trends in 2016:
  • The volume of spam emails in 2016 increased to 58.31 per cent of overall email traffic, a rise of 3.03 per cent on 2015
  • The US remained the biggest source of spam (12.08 per cent), with second place taken by Vietnam (10.32 per cent), and India in third (10.15 per cent)
  • Germany remained in first place among the countries targeted by malicious mailshots (14.13 per cent). The second and third places were occupied by Japan (7.59 per cent) and China (7.32 per cent), both of which were outside the top 10 in 2015
  • 15.29 per cent of unique users were attacked by phishers
  • In 2016 the average proportion of phishing attacks against customers of financial institutions was 47.48 per cent, up from 34.33 per cent in 2015 and 28.74 per cent in 2014
  • Trojan.Win32.Bayrob was used to send out spam and steal personal data, and was the most popular malware family distributed via email
 
Hot spam topics of the year: sport and terrorism
Phishers, predictably, could not pass on the opportunity presented by the most high-profile event of the year – the Olympic Games in Brazil. Fraudulent spam also exploited other major sporting events, including the European Football Championship, as well as the upcoming World Cups in 2018 and 2022. Spammers sent out fake lottery win notifications related to these events. The lottery was supposedly run by an official organisation and the recipient’s address had been randomly selected from millions of other addresses. This theme was also used in malicious spam. In this case, the emails included a ZIP archive attachment with a JavaScript downloader detected by Kaspersky Lab as Trojan-Downloader.Script.Generic. This malware, in turn, downloaded other malicious software to the victims’ computers.
The subject of terrorism, which has remained an important global issue in recent years, especially around the tense situation in Syria, was also exploited in spam mailings. Numerous so-called Nigerian letters, leveraging the problem of terrorism and refugees, were sent to users on behalf of both state organisation employees and individuals. The details of the stories may have differed, but the senders’ intentions were the same – to get the recipient’s attention with promises of large sums of money and make them join a conversation.
Chinese entrepreneurs on the rise
Spam advertisements became very popular with small and medium businesses in China in 2016. The text of a typical spam message generally began with an impersonal greeting to the recipient, followed by the name and surname of a factory manager. Often, the email described the merits of the company, its achievements and types of certification.
Chinese businesses have not started to use new, more targeted, convenient and less intrusive advertising platforms, such as social networking sites, and Kaspersky Lab researchers believe this may be because social networks in China are mainly internal, with global giants such as Facebook not being permitted. As a result, Chinese entrepreneurs have far fewer legal means of entering the international market, even though the state has passed its own anti-spam law, which is one of the strictest in the world.
Ransom is king
In 2016, a huge amount of malicious spam was recorded. The absolute leaders in spam were the Trojan downloaders that download ransomware to a victim’s computer. The most popular were mass spam mailings sent out to infect user computers with the Locky encryptor. However, other ransomware such as Petya, Cryakl and Shade were also widespread.

The number of malicious programs began to increase in December 2015 and continued to grow in waves throughout the following year. The sharp falls were mainly caused by the fact that cybercriminals temporarily disabled the Necurs botnet, responsible for the majority of spam spreading Locky.
“2016 saw a variety of changes in spam flows, with an increase in the number of malicious mass mailings containing ransomware being the most significant. Such an extensive use of ransomware may be due to the availability of this sort of malware on the black market. Currently, cybercriminals can not only rent a botnet to send out spam, they can also use so-called Ransomware-as-a-Service. This means that the attacker may not be a hacker in the traditional sense, and may not even know how to code. In 2017 the volume of malicious spam is unlikely to fall,” said Darya Gudkova, Spam Analyst Expert at Kaspersky Lab.

Research shows ‘game needs to be changed,’ with security innovation years behind that of the...
73% of organizations lack automated patch management, and 62% experienced incidents involving...
Quest Software has signed a definitive agreement with Clearlake Capital Group, L.P. (together with...
Dell EMC PowerProtect Cyber Recovery for AWS provides a fast, easy-to-deploy public cloud vault to...
Aqua’s cloud native application protection platform becomes the only solution that protects cloud...
54% of organisations working on a security transformation project now or in the next 12 months.
Node4 has released its Mid-Market IT Priorities Report 2021. The independent report reveals that...
Zscaler Zero Trust exchange cloud-based architecture enables superior green security capabilities...